New software architecture design styles are coming out every year. They promise to offer greater flexibility, more power, and more freedom to compute in unique ways. Unfortunately, with this greater power comes a greater responsibility to ensure security holes are addressed. Read more
Posts Tagged: access management
Daniel Lindau of Curity provides an overview of important OAuth flows and abilities The API space requires authorization in order to secure data – this is a given in the modern era. Accordingly, implementing the correct authorization system is vitally important, perhaps even more important than the API it is meant to handle authorization for. Read more
An Introduction to System for Cross-domain Identity Management (SCIM)
What is SCIM?
SCIM stands for “System for Cross-domain Identity Management” and is firstly a standardized way of representing users, groups, and anything related. Secondly, SCIM helps to standardize methods for acting on this data, such as creating, querying, searching, updating, and deleting. Read more
Open banking has garnered a lot of attention recently. With the introduction of UK open banking and Payment Services Directive 2 (PSD2) becoming law across the European Union, regulations are fundamentally altering the way banks handle personal data. The movement is also not restricted to Europe, with regulators in the USA having released their intentions in October 2017 on access to bank accounts. Read more
GraphQL is a very powerful query language that does a great many things right. When implemented properly, GraphQL offers an extremely elegant methodology for data retrieval, more backend stability, and increased query efficiency.
The key here though is that simple phrase — when implemented properly. Read more